Security Advisory Important: rubygem-openshift-origin-node security update

Advisory: RHSA-2014:0529-1
Type: Security Advisory
Severity: Important
Issued on: 2014-05-21
Last updated on: 2014-05-21
Affected Products: Red Hat OpenShift Enterprise 2
CVEs (cve.mitre.org): CVE-2014-0233

Details

An updated rubygem-openshift-origin-node package that fixes one security
issue is now available for Red Hat OpenShift Enterprise 2.0.

The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The rubygem-openshift-origin-node package provides basic OpenShift node
functionality.

A command injection flaw was found in rubygem-openshift-origin-node.
A remote, authenticated user permitted to run cartridges via the web
interface could use this flaw to execute arbitrary code with root
privileges on the Red Hat OpenShift node server. (CVE-2014-0233)

This issue was discovered by Jeremy Choi of the Red Hat HSS Pen-test Team.

All rubygem-openshift-origin-node users are advised to upgrade to this
updated package, which contains a backported patch to correct this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat OpenShift Enterprise 2

SRPMS:
rubygem-openshift-origin-node-1.17.5.16-1.el6op.src.rpm
File outdated by:  RHSA-2014:0763
    MD5: 7acbd6816ad3c82dcd7ccc70ff7bf90a
SHA-256: b3b45e6f0d2850c45b10e8518c9db33a4d3330a76d2fe3d84df51c09e085a8a7
 
x86_64:
rubygem-openshift-origin-node-1.17.5.16-1.el6op.noarch.rpm
File outdated by:  RHSA-2014:0763
    MD5: caa4b53e8769aaec73287b75665dfd37
SHA-256: 78b5f45c240fe0f393877f5555ebbbfd23fc495ced5026c867f5ee1dae2fcbb9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1096955 - CVE-2014-0233 OpenShift: downloadable cartridge source url file command execution as root


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/